The postings on this site solely reflect the personal views of each author and do not necessarily represent the views, positions, strategies or opinions of IBM or IBM management. IBM reserves the right to remove content deemed inappropriate.

Meeting
customers
on
their
own
terms
requires
providing
immediacy
of
response,
individualized
marketing
offers
and
self-service
capabilities.
Organizations
are
developing
new
systems
and
applications
to
give
customers
the
features
they
relish.
What
businesses
may
not
yet
realize
is
the
importance
of
connecting
the
new
systems
that
support
customer
engagement
with
... [ + Read more ]

By
Craig
Riegelhaupt,
Product
Marketing
Manager
for
IBM
Business
Process
Management
and
Operational
Decision
Management
In
2011,
IBM
conducted
over
3,000
CIO
interviews
and
99
percent
of
these
CIO’s
who
had
mandates
to
transform
their
business
wanted
to
create
better
processes.
The
IBM
Global
CIO
Study
confirmed
that
process
reinvention
is
... [ + Read more ]

Predictive
maintenance
involves
predicting
when
a
component
will
fail
or
require
service,
before
that
failure
happens.
It
goes
well
beyond
traditional
approaches,
such
as
reactive
maintenance
(replace
components
after
they
fail)
or
scheduled
maintenance
(replace
components
on
a
pre-determined
schedule).
Instead
a
predictive
maintenance
solution
uses
historical
data
to
predict
... [ + Read more ]

Post
by
Anne Lescher
The
latest
zEnterprise
security
enhancements
continue
to
extend
the
already
highly
regarded
mainframe
security
across
every
layer
of
the
system
from
hardware,
to
operating
system,
to
software.
With
greater
than
45
years
of
integration
between
hardware
and
software,
IBM
System
z
servers
and
security
software
are
designed
to
... [ + Read more ]

It
was
one
of
those
warm
calm
nights,
and
I
decided
to
have
a
hot
fudge
sundae.
In
that
quiet
time
of
enjoyment
I
began
thinking
about
how
good
the
ice
cream
tasted
–
as
well
as
the
hot
fudge.
Both
were
good!
Then
I
thought
about
the
clever
person
... [ + Read more ]

By
Arun
Madan
STSM,
Executive
Architect
Manager,
Associate
Director
Security
&
Enterprise
Architecture,
GTS-SO
India
Exhausted,
I
had
just
landed
at
the
airport
in
Austin,
TX,
coming
all
the
way
from
Delhi.
It
was
Thanksgiving
Day,
and
everybody
was
in
a
holiday
mood.
When
I
put
my
hand
in
my
pocket
to
look
for
... [ + Read more ]

location.replace("http://securityintelligence.com/top-7-cloud-security-questions-to-ask/");
We’ve
reached
the
point
that
most
enterprises
have
moved
past
“If
we
deploy
a
Cloud,”
to
“When
we
deploy
a
Cloud.”
Often
the
next
statement
is,
“We’re
going
to
start
small,
try
it
out
and
see
how
it
goes,
before
we
expand
to
broader
deployment,
more
users
and
applications.”
What’s
... [ + Read more ]

The
access
to
unprecedented
amounts
of
data
in
today's
interconnected
world
creates
an
opportunity
for
deeper
insight,
earlier
intervention
and
more
informed
decision-making.
And
as
Seattle
Children's
Hospital
is discovering,
the
ability
to
deliver
precise
answers
to
support
a
medical
diagnosis
using
this
data
could
go
a
long
way
toward
more
... [ + Read more ]

Delivering
quality
software
on-time
and
on-target
isn’t
easy.
A
large
chunk
of
time
is
often
spent
troubleshooting
application
issues
in
test
and
production.
And
the
resulting
bottlenecks
can
stifle
progress
and
innovation.
But
now
there’s
a
new
approach
to
software
development
called
DevOps
that
puts
the
development
shop
closer
to
operations
... [ + Read more ]

This
post
is
written
by
Anne
Lescher,
Product
Marketing
Manager
with
IBM
Security
Solutions.
It
seems
like
everyone
is
rushing
to
keep
up
with
the
latest
IT
innovations
supporting
our
business
operations.
There
is
pressure
to
implement
hot
new
state-of-the-art
technologies
supporting
BYOD
(Bring
Your
Own
Device),
cloud
computing,
mobile
applications,
... [ + Read more ]

Post
by
Vikash
Abraham,
Product
Marketing
Manager
for
IBM
Security
Solutions
What
Zen,
Ancient
Wisdom
and
Infrastructure
Security
Have
in
Common
Ancient
wisdom
continues
to
amaze
me,
and
this
struck
me:
Isn’t
there
a
strong
correlation
between
ancient
philosophies
and
infrastructure
security?
This
blog
post
does
not
look
at
measuring
the
superiority
... [ + Read more ]

By
Nilesh
Patel
IBM
Security
Specialist
Identity
and
Access
Management
and
Security
Intelligence
A
few
weeks
ago
I
was
playing
a
car
racing
game
with
some
remote
friends
on
our
game
console
over
the
Internet
connection,
and
we
were
all
really
enjoying
the
game.
At
one
point,
I
was
about
to
cross
the
... [ + Read more ]

As
part
of
its
efforts
to
fuel
global
innovation,
IBM
regularly
opens
its
lab
doors
to
people
from
business
and
academia
so
they
can
work
directly
with
our
researchers
to
fine-tune
their
skills
and
help
develop
solutions
for
solving
key
local
and
global
challenges —
like
traffic,
healthcare,
energy,
water
and
... [ + Read more ]

Today,
there
is
a
greater
understanding
of
cyber
security
risks
and
challenges
than
ever
before
because
it
is
hard
to
go
even
a
single
day
without
reading
a
story
about
an
organization
that
has
been
breached.
For
many
people
the
challenges
around
internet
and
computer
security
are
also
ones
that
... [ + Read more ]

“Give
me
a
place
to
stand
and
I shall move the earth with it.”
~
Archimedes
What
will
the
future
look
like?
Like
everything
you
know
now,
like
you’ve
never
seen
before.
Children
will
learn…from
classrooms
on
their
phone.
Travelers
will
still
check
into
flights
–
with
neither
paper
nor
people.
You’ll
hail
a
cab
–
from
a
company
with
no
... [ + Read more ]